General

  • Target

    echo1.exe

  • Size

    49.6MB

  • Sample

    240607-q3313aab28

  • MD5

    bd7a77c0b16ff88c51db4c9e355b30a5

  • SHA1

    55a760aadef48af0d0b6a1c87bb105fe1bd54192

  • SHA256

    353b7b597931b83bc1f3035111d05a11503700152469f276d4c91e6e1808bf7a

  • SHA512

    ff2c3c56a850ed2aa39ecb64fd8c7233d3bea9550d88f6925806479555cc9d8922f4c9767ae66e72f259fda98b9e41db393d51d6f67283a4eec1d94531a6001d

  • SSDEEP

    786432:8p039wWpiCV6Ib7QRujuPuvBe70dDHBtd5ZEKFzF0d/G7ObYLAwouZtRL:8ps9frb70PNoRLd5ZEKtvObYLAqt

Malware Config

Targets

    • Target

      echo1.exe

    • Size

      49.6MB

    • MD5

      bd7a77c0b16ff88c51db4c9e355b30a5

    • SHA1

      55a760aadef48af0d0b6a1c87bb105fe1bd54192

    • SHA256

      353b7b597931b83bc1f3035111d05a11503700152469f276d4c91e6e1808bf7a

    • SHA512

      ff2c3c56a850ed2aa39ecb64fd8c7233d3bea9550d88f6925806479555cc9d8922f4c9767ae66e72f259fda98b9e41db393d51d6f67283a4eec1d94531a6001d

    • SSDEEP

      786432:8p039wWpiCV6Ib7QRujuPuvBe70dDHBtd5ZEKFzF0d/G7ObYLAwouZtRL:8ps9frb70PNoRLd5ZEKtvObYLAqt

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Contacts a large (1803) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks